Enterprise users of Solid State Drives (SSD) have become increasingly vigilant about the health and longevity of the memory within their servers. How to deal with servers memory’s endurance There is a growing awareness among many datacentres operating commercially critical systems that the benefits of the fast speeds delivered by flash memory also has a […]

UK government has introduced a new, simpler security classification system for its data, Stephen Coty, chief security evangelist for Alert Logic, comments are as follows : “Data Classification is something that every company should be practicing, not just the government. It is the act of placing data into categories that will determine the level of […]

IFSEC International moved to ExCel London from 17-19 June 2014 and provides a solid platform for a buoyant market. IFSEC International, organised by UBM Live, continues to thrive as the only destination to serve the whole security buying chain, which has been solidified by its move to ExCeL London from 17-19 June. Taking place at its […]

As we commence the opening of the winter Olympics tomorrow and given the heightened interest this year, this is also a prime opportunity for cybercriminals to exploit the security of the games online using phishing attacks and sending harmful emails. David Grange, director of operations and client services (EMEA) at Dyn offers his comments on the […]

The Key to Your Organization’s Well-Being Best Practices for Secure Shell Key Management By Jason Thompson, global director of marketing for SSH Communications Security A lot can happen in twenty years. Over the past two decades, operating systems have moved from DOS to Windows to mobile platforms. The Internet has completely changed how we interact […]

FireHost launches secure data centre in Singapore to serve multi-national customers. FireHost has recently expanded into the Asia Pacific (AsiaPac) region with the launch of a secure data centre in Singapore. This facility primarily services global customers based in North America, Europe and the Middle East, giving companies further opportunity to do business in the fast-growing […]

The year 2014 is going to be crucial for cybersecurity. Here we have compiled a list of threats that you should look out for in 2014: Different approaches to cybersecurity: Dealing with cybrsecurity isn’t an easy task; it requires meticulous planning and execution. However, what the government of the USA and European Union are doing […]

CipherCloud has acquired CloudUp Networks complementing its market strategy to secure sensitive data in the cloud. CipherCloud continues to focus on developing security innovations that remove the data privacy and compliance barriers to cloud adoption. The company began its cloud protection journey by delivering encryption, tokenisation and Data Loss Prevention (DLP) capabilities that solved the immediate […]

Cyber-Threats attached to suspicious files can be neutralised by new Votiro service. Votiro is releasing a free cloud-based file sanitization service. The new file sanitization service analyses uploaded files for the presence of malicious code and facilitates the quick neutralisation of zero-day exploits and the detection of trojans, viruses and worms. This new file sanitization […]